- Description
- An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-284
- Hype score
- Not currently trending
🔴 RuoYi, Privilege Escalation, #CVE-2025-28409 (Critical) https://t.co/LLzr8aUuyk
@dailycve
9 Apr 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-28409 ❓ 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/WaPE4vFdcQ 🔗 https://t.co/J9fy11vVZT #CyberCron #VulnAlert #InfoSec https://t.co/ChTAW0JHoM
@cybercronai
7 Apr 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-28409 An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the re… https://t.co/J89hgZFwio
@CVEnew
7 Apr 2025
308 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruoyi:ruoyi:4.8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1248589F-5F63-4535-B2C9-EBBA85EA6D83"
}
],
"operator": "OR"
}
]
}
]